Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 20 of 20) sorted by relevance

/system/keymaster/
Dkeymaster_enforcement_test.cpp523 token.challenge = 99; in TEST_F()
538 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set, op_params, token.challenge, in TEST_F()
546 token.challenge = 99; in TEST_F()
563 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set, op_params, token.challenge, in TEST_F()
568 token.challenge, false /* is_begin_operation */)); in TEST_F()
575 token.challenge = 99; in TEST_F()
591 token.challenge + 1 /* doesn't match token */, in TEST_F()
599 token.challenge = 99; in TEST_F()
614 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set, op_params, token.challenge, in TEST_F()
619 token.challenge, false /* is_begin_operation */)); in TEST_F()
[all …]
Dkeymaster_enforcement.cpp465 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { in AuthTokenMatches()
466 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle); in AuthTokenMatches()
Dandroid_keymaster_test.cpp3544 static bool verify_attestation_record(const string& challenge, in verify_attestation_record() argument
3580 EXPECT_EQ(challenge.length(), att_challenge.data_length); in verify_attestation_record()
3581 EXPECT_EQ(0, memcmp(challenge.data(), att_challenge.data, challenge.length())); in verify_attestation_record()
/system/gatekeeper/
Dgatekeeper_messages.cpp134 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, in VerifyRequest() argument
137 this->challenge = challenge; in VerifyRequest()
161 return sizeof(challenge) + serialized_buffer_size(password_handle) in nonErrorSerializedSize()
166 memcpy(buffer, &challenge, sizeof(challenge)); in nonErrorSerialize()
167 buffer += sizeof(challenge); in nonErrorSerialize()
184 memcpy(&challenge, payload, sizeof(challenge)); in nonErrorDeserialize()
185 payload += sizeof(challenge); in nonErrorDeserialize()
Dgatekeeper.cpp153 user_id, authenticator_id, request.challenge); in Verify()
219 uint64_t challenge) { in MintAuthToken() argument
226 token->challenge = challenge; in MintAuthToken()
/system/tpm/attestation/common/
Dattestation_ca.proto132 // The challenge data (as in challenge-response) generated by the server.
139 // A string for the client to sanity check a legitimate challenge.
144 // challenge may be replayed.
148 // The response data (as in challenge-response) generated by the client.
155 // The original challenge data.
156 optional SignedData challenge = 1; field
158 // prevents a caller from using a challenge to sign arbitrary data.
183 // with a random challenge. The SignedPublicKeyAndChallenge specification is
/system/core/trusty/gatekeeper/
Dtrusty_gatekeeper.cpp123 int TrustyGateKeeperDevice::Verify(uint32_t uid, uint64_t challenge, in Verify() argument
137 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in Verify()
216 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument
226 return convert_device(dev)->Verify(uid, challenge, enrolled_password_handle, in verify()
Dtrusty_gatekeeper.h61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle,
112 static int verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
/system/core/gatekeeperd/
DSoftGateKeeperDevice.cpp72 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument
88 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in verify()
Dgatekeeperd.cpp197 virtual int verifyChallenge(uint32_t uid, uint64_t challenge, in verifyChallenge() argument
219 ret = device->verify(device, uid, challenge, in verifyChallenge()
226 ret = soft_dev.verify(uid, challenge, in verifyChallenge()
237 ret = soft_device->verify(uid, challenge, in verifyChallenge()
DSoftGateKeeperDevice.h66 int verify(uint32_t uid, uint64_t challenge,
DIGateKeeperService.cpp110 uint64_t challenge = data.readInt64(); in onTransact() local
125 int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle, in onTransact()
DIGateKeeperService.h85 virtual int verifyChallenge(uint32_t uid, uint64_t challenge,
/system/gatekeeper/include/gatekeeper/
Dgatekeeper_messages.h140 uint64_t challenge,
150 uint64_t challenge; member
Dgatekeeper.h180 secure_id_t user_id, secure_id_t authenticator_id, uint64_t challenge);
/system/security/keystore/
Dauth_token_table.cpp111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization()
168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); in MarkCompleted()
181 operation_completed_(token_->challenge == 0) { in Entry()
/system/security/keystore/tests/
Dauth_token_table_test.cpp69 static hw_auth_token_t* make_token(uint64_t rsid, uint64_t ssid = 0, uint64_t challenge = 0, in make_token() argument
75 token->challenge = challenge; in make_token()
/system/core/gatekeeperd/tests/
Dgatekeeper_test.cpp88 ASSERT_EQ((uint64_t) 1, auth_token->challenge); in TEST()
/system/gatekeeper/tests/
Dgatekeeper_messages_test.cpp182 ASSERT_EQ((uint64_t) 1, deserialized_msg.challenge); in TEST()
/system/connectivity/shill/doc/
Dservice-api.txt959 challenge/response protocol. See the
960 "--static-challenge" option in the OpenVPN
990 single-use token to be used during the static challenge